On May 3rd, 2022, Splunk published a security advisory for a Path traversal in search parameter that can potentiall allow SPL injection. An attacker can cause the application to load data from incorrect endpoints, urls leading to outcomes such as running arbitrary SPL queries.
- Type: TTP
Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Last Updated: 2022-04-29
- Author: Rod Soto, Splunk
- ID: dfe55688-82ed-4d24-a21b-ed8f0e0fda99
|T1083||File and Directory Discovery||Discovery|
Kill Chain Phase
- CIS 3
- CIS 5
- CIS 16
1 2 3 4 `path_traversal_spl_injection` | search "\/..\/..\/..\/..\/..\/..\/..\/..\/..\/" | stats count by status clientip method uri_path uri_query | `path_traversal_spl_injection_filter`
The SPL above uses the following Macros:
Note that path_traversal_spl_injection_filter is a empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL.
How To Implement
This detection does not require you to ingest any new data. The detection does require the ability to search the _internal index. This search will provide search UI requests with path traversal parameter (“../../../../../../../../../”) which shows exploitation attempts.
Known False Positives
This search may find additional path traversal exploitation attempts.
Associated Analytic story
|40.0||50||80||Path traversal exploitation attempt from $clientip$|
source | version: 1